IF

bh

 

VOLUME 2 ISSUE 6 November-December 2011

ISSN 0975 - 9646

1.
Study of Traditional Upstream Congestion Control Algorithm with various Metrics in Realistic WSN Scenarios
Pages : 2473-2478
V. Vijaya Raja, R. Rani Hemamalini and A. Jose Anand
Abstract | PDFPDF
2.
Active Queue Management for Flow Congestion Control in wireless network
Pages : 2479-2481
Kiran babu Kommu, Kakara Ravi Kumar, Srinivasa Rao S
Abstract | PDFPDF
3.
Dynamic Bandwidth for Minimum Delay Peer-to-peer Streaming
Pages : 2482-2484
K. Venkata Ganesh Babu, K. Ravi Kumar
Abstract | PDFPDF
4. An Adaptive Rate Control based QoS Provisioning in Mobile Ad hoc Networks
Pages : 2485-2491.
S.Venkatasubramanian
Abstract | PDFPDF
5. Emotion Recognition System for English Dialects using Dimensional Theory
Pages : 2492-2495.
M. Chinna Rao, A.V.S.N. Murthy
Abstract | PDFPDF
6. High Secure Crypto Biometric Authentication Protocol
Pages : 2496-2502
K Hemanth, Srinivasulu Asadi, Dabbu Murali, N Karimulla and M Aswin
Abstract | PDFPDF
7.
Performance Evaluation of Grid Computing in Trust Related Environment
Pages : 2503-2506.
V.Vijayakumar, R.S.D.Wahidabanu
Abstract | PDFPDF
8.
Design a MNUR method for Finding Similarity between Fingerprint Images Based on Fingerprint Detection Technique -1
Pages : 2507-2509
Jitendra Singh Sengar, Jasvinder Pal Singh, Niresh Sharma
Abstract | PDFPDF
9.
Article Removed
Pages : 2510-2516
Article Removed
Abstract | PDFPDF
10. BiFree: An Efficient Biclustering Technique for Gene Expression Data Using Two Layer Free
Weighted Bipartite Graph Crossing Minimization
Pages : 2517-2524
Suvendu Kanungo, Gadadhar Sahoo, Manoj Madhava Gore
Abstract | PDFPDF
11. Seamless handoff in Next Generation Wireless System
Pages : 2525-2530
Poonam B. Bhilare, Santosh S. Sambare
Abstract | PDFPDF
12. Real Time Security Control System For Smoke and Fire Detection Using ZigBee
Pages : 2531-2540.
Suneel Mudunuru, V. Narasimha Nayak, G.Madhusudhana Rao, K.Sreenivasa Ravi
Abstract | PDFPDF
13.
Dynamic Approch to Retrive the Web Pages
Pages : 2541-2547
Muthe V Satya Nagaraju, U. Nanaji
Abstract | PDFPDF
14.
Using Hybrid And LQR Method Control Of A Self-Erecting Rotary Inverted Pendulum System
Based On PIC 18F4431
Pages : 2548-2553
Huu Chan Thanh Nguyen, An Wen Shen
Abstract | PDFPDF
15.

Adaptive MIMO-OFDM Scheme to Reduce Complexity and Optimize User Data Rate Over Fading Channel in Wireless Sensor Networks
Pages : 2554-2561
L.C.Siddanna Gowd A. Natarajan , M.Manikandan and R.Pavendiran
Abstract | PDFPDF

16. Detecting the Age of the Fish through Image Processing using its Morphological Features
Pages : 2562-2567
G.T.Shrivakshan , C. Chandrasekar
Abstract | PDFPDF
17. Node Localization in Wireless Sensor Networks
Pages : 2568-2572
P.K Singh, Bharat Tripathi, Narendra Pal Singh
Abstract | PDFPDF
18. Image segmentation-MR Images Segmentation with A Modified Gaussian Mixture Model
Pages : 2573-2578
P.Daniel Ratna Raju, G.Neelima, K.Prasada Rao
Abstract | PDFPDF
19. An Approach to Improve the Security of Online System using Crypto System
Pages: 2579-2583
M.V.B.T.Santhi, K.Deepthi, Ch.Satya Keerthi .N.V.L, P.Lakshmi Prasanna
Abstract | PDFPDF
20. A Review on LBG Algorithm for Image Compression
Pages: 2584-2589
Asmita A.Bardekar, P.A.Tijare
Abstract | PDFPDF
21.
Secure Employee Information System to Manage Integrated Network Services
Pages : 2590-2595
P.Rama Rao, O.Obulesu
Abstract | PDFPDF
22.
An inference routing tree topology algorithm for reducing overhead in packet probing
Pages : 2596-2601
V. Srujana and Vadlamudi Rajesh
Abstract | PDFPDF
23.
Throughput Enhancement by Robust Routing in MANET
Pages : 2602-2606
Manikonda Aparna, Motahar Reza
Abstract | PDFPDF
24.
A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV routing protocol in
MANET
Pages : 2607-2613
Onkar V. Chandure, V. T. Gaikwad
Abstract | PDFPDF
25. Analysis of Optimal Route Algorithms Under Constraint Conditions
Pages : 2614-2619
M.V.Mawale, Y.B.Gandole
Abstract | PDFPDF
26. Network Delay: Network Analyzer and Opnet Simulation Tool
Pages : 2620-2626
Sandhya Rani.S, Chandrasekhar.G
Abstract | PDFPDF
27. A Review of Security Metrics in Software Development Process
Pages : 2627-2631
Smriti Jain, Maya Ingle
Abstract | PDFPDF
28. Performance Evaluation of ATM Networks in Computer Simulation
Pages : 2632-2636
A. Ghaddar , Y. Mohanna , M. Dbouk , O. Bazzi
Abstract | PDFPDF
29.
Article Withdrawn
Pages : 2637-2644
xxx,xxx
Abstract | PDFPDF
30. Reducing End to End per Packet Energy Consumption
Pages : 2645-2649
N.Annapurna#1, M.V.Vijaya Saradhi
Abstract | PDFPDF
31. Smart Sensor System for Agricultural Chronology
Pages : 2650-2658
K.Srinivasa Ravi, K.Tapaswi, B.Lokesh, G.Sai Krishna
Abstract | PDFPDF
32. A Novel Iris Recognition System Using Statistical Feature Analysis By Haar Wavelet
Pages : 2659-2662
S.Balaji, G.Gayathri, K.Lokesh, S.Sindhu
Abstract | PDFPDF
33. Reduced -Reference Image Quality Assessment
Pages : 2663-2665
Shraddha N. Utane, V. K. Shandilya
Abstract | PDFPDF
34. A Controller Based Approach for Web Services Virtualized Instance Allocation
Pages : 2666-2670
Sandesh Tripathi , S Q Abbas , Rizwan Beg
Abstract | PDFPDF
35.
Solution of Time Constrained Vehicle Routing Problems using Multi-Objective Hybrid Genetic Algorithm
Pages : 2671-2676
Bhawna Minocha, Saswati Tripathi
Abstract | PDFPDF
36. Mining frequent item sets without candidate generation using FP-Trees
Pages : 2677-2685
G.Nageswara Rao, Suman Kumar Gurram
Abstract | PDFPDF
37.
A Novel Approach of Watershed Segmentation of Noisy Image Using Adaptive Wavelet Threshold
Pages : 2686-2690
Nilanjan Dey, Arpan Sinha, Pranati Rakshit
Abstract | PDFPDF
38.
Privacy-Preserving Public Auditing In Cloud Storage Security
Pages : 2691-2693
D. Srinivas
Abstract | PDFPDF
39.
Enhancement of Diabetic Retinopathy Imagery Using Contrast Limited Adaptive Histogram
Equalization
Pages : 2694-2699
Saikat Kumar Shome, Siva Ram Krishna Vadali
Abstract | PDFPDF
40
Dynamic Congestion control for TCP in Peer - to - Peer Network
Pages : 2700-2702
D. Raghu, Thatha Reddy Karri ,Ch. Raja Jacob
Abstract | PDFPDF
41.
Route Management Protocol for Misbehavior in Ad Hoc Networks
Pages : 2703-2709
A. Shalini,Krishna Rao, Sridhar G
Abstract | PDFPDF
42.
A Comparison of Rule based and Distance Based Semantic Video Mining
Pages : 2710-2713
D.Raghu, K.sandeep , CH. Raja Jacob
Abstract | PDFPDF
43..
Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching
Pages : 2714-2718
B.S.V.N.L.Gayatri M.H.M. Krishna Prasad
Abstract | PDFPDF
44.
Face Detection by Fine Tuning the Gabor Filter Parameter
Pages : 2719-2724
Suraj Prakash Sahu , Vibhav Anand, Nitin Kumar*, Pavan Chakraborty and G.C.Nandi
Abstract | PDFPDF
45.
Improving User Experience by Mining Usage Patterns
Pages : 2725-2727
J.Isabella,R.M.Suresh
Abstract | PDFPDF
46.
Virtual Instrumentation as an Effective Enhancement to Laboratory Experiment
Pages : 2728-2733
Yogendra B.Gandole
Abstract | PDFPDF
47.
Dynamic Vision-Based Approach in Web Data Extraction
Pages : 2734-2736
D.Raghu, V.Sridhar Reddy, Ch.Raja Jacob
Abstract | PDFPDF
48.
Article Removed
Pages : 2737-2739
xxxx, xxxx
Abstract | PDFPDF
49.
An Efficient Channel Allocation in Mobile Computing
Pages : 2740-2747
A.S.C.Padma, M.Chinnaarao
Abstract | PDFPDF
50.
RSVP protocol in Multimedia Networks
Pages :2748-2751
T. SaiDurga, D. V.Manjula
Abstract | PDFPDF
51.
Design and Performance Evaluation of Transmitted Reference BPSK UWB Receiver using SIMULINK
Pages : 2752-2760
Alpana P. Adsul , Shrikant. K. Bodhe
Abstract | PDFPDF
52.
A New Low Power 9T SRAM Cell based on CNTFET at 32nm Technology Node
Pages : 2761-2764
Rajendra Prasad S, Dr. B K Madhavi, Dr. K Lal Kishore
Abstract | PDFPDF
53.
Neural Network Based Authentication and Verification for Web Based Key Stroke Dynamics
Pages : 2765-2772
D. RAGHU, CH. RAJA JACOB, Y.V.K.D.BHAVANI
Abstract | PDFPDF
54.
Medical Image Classification Using Information Gain for Global Feature Reduction
Pages : 2773-2775
T.Baranidharan, Dr.D.K.Ghosh
Abstract | PDFPDF
55.
ANT COLONY OPTIMIZATION ROUTING to MOBILE AD HOC NETWORKS in URBAN ENVIRONMENTS
Pages : 2776-2779
Manjula Poojary, B.Renuka
Abstract | PDFPDF
56.
Efficient way of Detecting Malicious Packet Losses
Pages : 2780-2783
K Bala murali Krishna,K Prasada Rao
Abstract | PDFPDF
57.
A Review of Security and Privacy Issues in Social Networking
Pages : 2784-2787
A. A. Sattikar, Dr. R. V. Kulkarni
Abstract | PDFPDF
58.
Efficient Apriori Mend Algorithm for Pattern Extraction Process
Pages : 2788-2791
D.Magdalene Delighta Angeline ,I.Samuel Peter James
Abstract | PDFPDF
59.
ESDPMANT: Efficient Service Discovery Protocols for Mobile Ad Hoc Networks.
Pages : 2792-2795
Raghu.Devarapalli, Jeevan babu.Vara, Raja Jacob.Chidipi, Lakshman babu.Didde
Abstract | PDFPDF
60.
The Performance of Parallel Algorithms by Amdahl's Law, Gustafson's Trend
Pages : 2796-2799
Juby Mathew, Dr.R Vijayakumar
Abstract | PDFPDF
61.
Network Security through SSL in Cloud Computing Environment
Pages : 2800-2803
Pankaj Patidar, Arpit Bhardwaj
Abstract | PDFPDF
62.
Comparative Study of DECIM-128 and DECIMV2 in relation to Compact Hash-based Message
Authentication Code
Pages : 2804-2806
P.Venkateswara Rao, K.Seetha Devi, CH.V. Phani Krishna, Dr. K.Subrahmanyam
Abstract | PDFPDF
63.
A Mobile IPv6-Based Architecture for Mobility of Mobile Terminals in Heterogeneous Networks
Pages : 2807-2810
G.Praveen,M.RajaRamesh
Abstract | PDFPDF
64.
Provably Secure Quantum Key Distribution Protocols in 802.11 Wireless Networks
Pages : 2811-2815
R.Lalu Naik , Dr.P.Chenna Reddy , U.Sathish Kumar
Abstract | PDFPDF
65.
Model Driven Design Method for Software Architecture
Pages : 2816-2821
Thodeti Srikanth, Dachepally Ravi Kumar , Mahi Naveen Kumar
Abstract | PDFPDF
66.
Information technology in Tourism
Pages : 2822-2825
Vidyullata Shekhar Jadhav,Shivaji D. Mundhe
Abstract | PDFPDF
67.
Wireless Communication Networks – A Study & Emergence of Multipath Dissemination
Pages : 2826-2829
B.Sailaja, N.Sujata Gupta
Abstract | PDFPDF
68.
Investigation of Classification Accuracy using Fast Hartley Transform for Feature Extraction
Pages : 2830-2834
V.Baby Deepa, Dr. P. Thangaraj
Abstract | PDFPDF
69.
NETWORK EVOLUTION in 3G / 4G: APPLICATIONS and SECURITY ISSUES
Pages : 2835-2837
Veera RaghavaRao Atukuri, RamaKrishna Mathe,Mrunalini Pamidipati
Abstract | PDFPDF
70.
Comparison of Frequent Item Set Mining Algorithms
Pages : 2838-2841
J.R.Jeba,S.P.Victor
Abstract | PDFPDF
71. Design and Realization of Augmented Reality Based Navigation Assistance System
Pages : 2842-2846
Veeraraghavulu Nakka, A Kabirdas
Abstract | PDFPDF
72. An Accomplishment of Web Personalization Using Web Mining Techniqu
Pages : 2847-2851
Y.Raju m B.Prashanth Kumar ,.D.Suresh Babu
Abstract | PDFPDF
73. Node Localization for Wireless Sensor Networks
Pages : 2852-2856
P.K Singh, Bharat Tripathi, Narendra Pal Singh
Abstract | PDFPDF
74. FaceMovie - A Novel Approach to Post the Mining Classification Data
Pages : 2857-2861
Venkata Ramana Adari ,Ch.Diwakar , P.Suresh Varma
Abstract | PDFPDF
75. Web Usage Mining: An Incremental Positive and Negative Association Rule Mining Approach
Pages : 2862-2866
Anuradha veleti, T.Nagalakshmi
Abstract | PDFPDF
76. Spatial Clustering Simulation on Analysis of Spatial-Temporal Crime Hotspot for Predicting Crime activities
Pages : 2867-2874
M.Vijaya Kumar,C.Chandrasekar
Abstract | PDFPDF
77. Scheduling in Wi-MAX Networks
Pages : 2875-2879
A. P.Vikram , B. T.Lakshmi Deepak ,and C. S.Deepthi
Abstract | PDFPDF
78. Detecting Application Denial-of-Service Attacks : A Dynamic Group-Testing-Based Approach
Pages : 2880-2884
Sikakolanu Hareesh Kumar, U. Nanaji
Abstract | PDFPDF
79. Analysis and Automation of Security Management System for Remote Terminals Based on Advanced Finger Print Reorganization Algorithm
Pages : 2885-2888
Sai Kumar Nadakudhiti, A KabirDas
Abstract | PDFPDF
80. A Novel Approach for Subjective Content Accessibility Mining using Lib Mart & Web Mart Classification having Multilayered Architecture
Pages : 2889-2893
Sachin Yele, Ravindra Gupta
Abstract | PDFPDF
81. A Process for Data Storage security in Cloud Computing
Pages : 2894-2897
Durgarajesh Rachamsetty, Prof Ramakrishna Rao TK
Abstract | PDFPDF
82. Mining Accurate Information on Web Using Truth Algorithm
Pages : 2898-2901
K.Vijaya Lakshmi , B.Jayanag, Dr. V.Srinivasa Rao
Abstract | PDFPDF
83. Security Issues on Inter-Vehicle Communications
Pages : 2902-2905
M.V.B.T.Santhi, K.Deepthi, Ch.Satya Keerthi .N.V.L,P.Lakshmi Prasanna
Abstract | PDFPDF
84. Warehouse Management for Improved Efficiency in A Small Warehouse
Pages : 2906-2908
M. Srikanth Yadav, Y. Eswara Rao, P. Sudhakar, Allada Aparna
Abstract | PDFPDF
85. Revocation and Self Healing of keys in Hierarchical Wireless Sensor Network
Pages : 2909-2914
G.N.Purohit,Asmita Singh Rawat
Abstract | PDFPDF
86. Software Quality Assurance in CMM and XPA Comparative Study
Pages : 2915-2919
CH.V. Phani Krishna and Dr. K.Rajasekhara Rao
Abstract | PDFPDF
87. Broadcasting Through UDG in Manets by GPS Assistance
Pages : 2920-2923
A. P.Vikram , B. K.Renuka ,and C. P.VenkataNaveen
Abstract | PDFPDF
88. Performance Analysis of Parallel Programming Tools
Pages : 2924-2931
Md Firoj Ali, Rafiqul Zaman Khan
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-